Cisco 2010 Midyear Security Report The impact of global security threats

advertisement
Cisco 2010
Midyear Security
Report
The impact of global security threats
and trends on the enterprise
Web 2.0, mobility, virtualization, and other dramatic shifts in how we communicate and
collaborate are carving out a new landscape for business and for enterprise security.
The Cisco® Midyear Security Report examines these changes and their impact on the
enterprise, and highlights other significant trends and threats creating security challenges
for organizations worldwide. The report also includes recommendations from Cisco
security experts designed to help enterprises strengthen their security.
2 Enterprises and the Tectonic Forces of Change
Cisco Study: Collaboration Critical to Employee Success
4 The Technologic Shift: The Proliferation of Mobile and Connected Devices
The Mobile Device Onslaught
What’s Disrupting the Enterprise? Consumerization of IT
Risk Alert: IP-Addressable Devices: Who’s Listening to Your Network?
What’s Disrupting the Enterprise? Mobility
8 The Economic Shift: Virtualization of Operations
What’s Disrupting the Enterprise? Virtualization
10 The Demographic Shift: The Role of Collaboration and Social Networks
Social Media for Enterprises: Upside and Downside
It’s 3 p.m.—What Are Your Employees Doing? Tending Their Virtual Fields
What’s Disrupting the Enterprise? Social Media
13
Worldwide Government Trends: The Impact on Business
Multiple Governments, Multiple Stances on Security
Global Security Guidelines: Should Business Become a Player?
U.S. Government Update
Privacy Issues Moving to the Forefront
16 Taking Action to Reduce Innovation Gaps
Criminals Now Protecting Their Intellectual Property
The Spread of IPv6 and Domain Name System Security
Risk Alert: A “Perfect Storm” of Technological Change
Explosive Growth in Connected Devices and Applications—Along with New Threats
20
Insight from the Security Researchers: Hackers Are Choosing Their Own Adventure
Risk Alert: Advanced Persistent Threats
Risk Alert: The Downside of Being a VIP (or Just Working for One)
Small Targets, Big Rewards
What Keeps Your IT Security Team Awake at Night?
25
Five Ways Enterprises Can Strengthen Their Security by 2011
30
Security Trends: Midyear Notes
32
Cisco Security Intelligence Operations
Cisco Security IntelliShield Alert Manager Service
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Cisco 2010 Midyear Security Report
1
Enterprises and the Tectonic
Forces of Change
The business world continues to evolve due to spectacular revolutionary forces that are changing the way we
work, live, learn, and play, and how we communicate and share information. These changes aren’t something
enterprises can choose to take part in or ignore; in fact, they’re already having a profound impact on your business
and your life at this very moment, whether you are unaware of or welcome the change.
These changes are part of the dramatic
shifts—“tectonic forces”—that are making
it essential for businesses to rethink their
approach to enterprise security. Gone are
the days when a network firewall would
deter teenagers looking to hack into
corporate databases for the challenge,
notoriety, or for the fun of it. Now, serious
and well-resourced criminals with
business plans are intent on stealing both
personal data and business intelligence
they can sell—and perimeter-based
security alone cannot stop them.
They likely would be most surprised about
not having to go to a specific location, such
as an office, to get their work done. People
are increasingly dependent on smartphones and other mobile devices for
everyday communication, collaboration,
and work, and are using this technology
more often beyond the traditional office
and network boundaries.
How do these changes affect an enterprise’s
plans to protect its data? Since workers
now collaborate and share vital information
outside of the workplace, security that’s
limited to the network edge is bound to
fail. The emerging “borderless network”
has no defined edge or boundary; instead,
it has many borders that are constantly
changing. And for the most part, enterprises
cannot effectively control the myriad
devices/endpoints on the network.
What are these forces? Primarily, the
rise of social networking, the enthusiastic
adoption and proliferation of networkconnected devices, and the embrace
of virtualization are altering the threat
landscape. Time travelers from the 1970s
would barely recognize today’s workplace.
Users also are relying on social networking services such as Facebook and
Twitter, online collaborative work tools like
Google Docs, and software-as-a-service
(SaaS) applications that don’t live on the
company’s servers. Even if an organization
attempts to ban access to certain web
services or sites, savvy users will find a
way around these attempts to continue to
access the services they find useful—and
believe are necessary to do their jobs.
2
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Cisco 2010 Midyear Security Report
This hastens the need for a new model
for security that acknowledges the movement of corporate data among offices,
smartphones, workers’ home computers,
laptops, Internet cafes, and any other
place where employees choose to work.
Workers want access to customer lists
and project data from their iPhones and
BlackBerry devices, whether they are
sitting in the coffee shop near their office
or waiting at an airport gate halfway across
the world. The enterprise is tasked with
granting them this “borderless” access,
while ensuring the data stays safe.
Effective controls are needed to address
the potential security and productivity
issues that can arise from uncontrolled
access to social networking services. New
data from Cisco shows that employees
accessing interactive games via Facebook
can spend an hour or more a day playing
these games (see graphic on page 11
for details). To manage security and
productivity, organizations should enact
clear policies regarding access to social
networking sites; in addition, they can
consider limiting access to social
networking to those employees whose
jobs require it (for example, PR and
marketing functions).
There are technical challenges—and
solutions—for this emerging environment.
For a security solution to be effective, a
change in mindset must take place. Too
often, enterprises view security as an
add-on, rather than a business enabler.
IT departments tend to operate on the
defense against security threats, instead
of on the offense with long-range plans for
managing security.
In addition, employees are too often
categorized as “part of the security
problem” and not willing participants
who can play a key role in improving an
organization’s security process. Fearful
of data loss or theft, enterprises may
unilaterally bar employees from accessing
webmail or social networking sites, or will
forbid any smartphone that’s not approved
for use by management. This way of thinking
does little to improve security—as stated,
workers will figure out how to circumvent
rules—and makes for a resentful workforce.
While some businesses may not see the
value in making the technological and cultural shifts necessary for modern security,
today’s threat landscape demands
more comprehensive security to protect
against criminals who operate online and
are armed with the same sophisticated
software tools (and talents) claimed by
the most tech-savvy businesses.
Criminal enterprises are entirely
professional in their approach to stealing
sensitive information. They are driven to
succeed and receive the payoff. They
also have key advantages that most
network security administrators do not:
plenty of time and resources to accomplish
their tasks.
Businesses are a prime target for today’s
online criminals, which is why the Cisco
2010 Midyear Security Report is tailored
for the business community. In particular
focus are the three “tectonic forces” of
change, which are dramatically altering
the cybersecurity landscape:
• The technologic shift: The proliferation
of mobile and connected devices
• The economic shift: Virtualization of
operations
• The demographic shift: The role of
collaboration and social networks
This report also examines another
significant challenge organizations must
face in the midst of all this dramatic
change: responding to the demands of
still-evolving security regulations and
expectations in the countries where they
conduct business.
Some enterprises may find that meeting
today’s security challenges is a daunting
task, but many will find it’s worth the effort:
Effective security practices are an asset
that can strengthen a company’s reputation
and competitive edge. The good news is
that viable solutions do exist.
Cisco Study: Collaboration Critical to Employee Success
Today’s employees expect to collaborate
extensively with their colleagues—and
believe it’s not just beneficial, but essential
to their careers and to the business. In a
recent study, Cisco surveyed employees
at midmarket and enterprise businesses
in the United States and found that when
workers embrace collaboration, they do
so wholeheartedly. More than 75 percent
said collaboration is critical to their success
on the job; more than 90 percent said
collaboration makes them more productive.
The study divided respondents into
four categories. Workers identified as
“Collaboration Enthusiasts”—those who
believe collaboration is a key business
differentiator—use an average of 22 tools,
including social networking sites, blogs,
and wikis, to connect with colleagues.
Respondents in the “Collaboration
Laggard” group use far fewer such tools,
often because their company doesn’t
make them available.
intend to champion collaborative work
processes, they must welcome the use
of tools and solutions that may feel
uncomfortable, from a security standpoint.
Competitive, entrepreneurial businesses
should consider the type of work environment they want to foster and employees
they would like to attract. If businesses
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Cisco 2010 Midyear Security Report
3
The Technologic Shift:
The Proliferation of Mobile and Connected Devices
Workers are reaching unprecedented levels of productivity because they are more connected to each other and
the information they need than ever before. In the past, individuals were first exposed to “cutting-edge” technology
in the workplace, and it took years for business-world innovations such as computers and copiers to become
fixtures in the home environment. But the consumerization of IT—where new technology is adopted by consumers
even before it is introduced into the enterprise—has changed the direction of technological innovation. In fact,
many individuals today have more computing power in their homes than in the workplace.
The Mobile Device
Onslaught
While having a more efficient workforce
is obviously a positive for businesses, the
proliferation of not only mobile, wireless
devices—but also connected devices—
in the enterprise creates security challenges for IT departments. Unsupported
laptops and smartphones (such as RIM
BlackBerry devices, Google Android
phones and the Palm Pre), consumer
devices (such as Apple iPods and iPads),
and IP-addressable devices (ranging
from digital cameras to digital printers)
are being pushed aggressively into the
workplace by employees at all levels,
from recent college graduates to C-level
executives. Users embrace new technology in their personal lives and resist the
idea that they can’t use the same devices
and applications at work—even if their
company’s security policy and the IT
department enforcing these rules forbid it.
4
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Cisco 2010 Midyear Security Report
However, the trend toward consumerization
of IT is not just about workers demanding
that they be allowed to use trendy new
devices for business instead of bland,
corporate-issued mobile phones or laptops.
This is about employees bringing a range
of devices into the enterprise that they
believe they must have access to for
optimal productivity. Consider what the
average young adult (a member of the
future workforce) will “need” to take to
college this fall: a laptop or netbook, a
smartphone, an MP3 player, gaming
console, digital video recorder, video
camera, and digital camera. And all these
devices can connect to the Internet—and
more often now to each other, as well.
It was only a few years ago that the typical
consumer or office worker had only one
connected device—and, in most cases,
it was a Microsoft Windows PC. But
dramatic advancement in both communications technology and consumer
electronics means that we are living and
working in an infinitely more complex
environment surrounded by a diverse
range of devices that can easily connect
to the Internet, to each other, and, quite
possibly, to your company’s network.
IT groups struggle with mobile device
management because there are so
many devices in a variety of form factors
in employees’ hands—and with them
comes an endless array of software
platforms, mobile applications, and
service providers. Users also constantly
switch devices to take advantage of the
latest technology development. And
inevitably, they lose devices—or allow
them to be compromised or stolen. It
would be ideal, of course, if IT could
manage all mobile devices in use in the
enterprise through their entire life cycle,
but due to the consumerization of IT, they
don’t have that control. Nor does IT have
the resources to even attempt to micromanage each individual device that is not
issued or supported by the enterprise.
There is no questioning IT’s challenge:
The number of mobile and wirelessenabled devices in use worldwide is
growing exponentially—as are the number
of remote and mobile workers. In the
United States alone, more than 257 million
data-capable devices were in circulation
at the end of 2009, compared with 228
million at the end of 2008, according
to CTIA, a nonprofit wireless industry
organization.1 Research firm IDC predicts
that by 2013, the number of mobile
devices—smartphones and wireless
devices—accessing the Internet will
surpass 1 billion.2
Enterprises can expect smartphones to
be a primary focus for attackers because
of their popularity—and the fact that they
are becoming the productivity and communications device of choice for many
workers. Infonetics Research anticipates
that smartphones will be the only mobile
phone segment to post double-digit
annual revenue growth over the next
five years. And according to Gartner,
“Most users in 2010 will use a PC as their
primary Web access device and their
phone as a secondary access device.
However, as take-up of smartphones
spreads globally, there will come a point in
2015 when the mobile phone will overtake
the PC as the most common primary
device for Web access worldwide.”3
To be sure, serious threats—such as
worms and malicious code—are in the
future for mobile devices. The first iPhone
worm, “Ikee,” appeared late last year,
written by an unemployed programmer
as a prank. It was a small-scale incident:
The worm targeted only Australian users
with “jailbroken” smartphones (phones
modified to run unauthorized software),
replacing the device’s wallpaper with
an image of 1980s pop star, Rick Astley.4
But more sinister actions are likely not
far behind: Researchers at Rutgers
University recently warned of rootkits that
can undermine a smartphone’s operating
system and allow criminals to eavesdrop
1 “CTIA-The Wireless Association Announces Semi-Annual Wireless Industry Survey Results,” media release,
March 23, 2010, www.ctia.org/media/press/body.cfm/prid/1936.
2 “IDC: 1 Billion Mobile Devices Will Go Online by 2013,” by Agam Shah, CIO.com, December 9, 2009,
www.cio.com/article/510440/IDC_1_Billion_Mobile_Devices_Will_Go_Online_By_2013.
3 Gartner’s Top Predictions for IT Organizations and Users, 2010 and Beyond: A New Balance, G. Gammage,
Gartner, Inc., December 29, 2009.
4 “Jailbroken iPhones: set free to get mugged,” by John Cox, John Cox on Wireless, NetworkWorld.com Community,
November 10, 2009, www.networkworld.com/community/node/47588.
What’s Disrupting the Enterprise? Consumerization of IT Devices and applications that are first adopted by users
outside the work environment have made great inroads within
businesses—but not without raising tough questions about
their impact on enterprise security. Use of technology that
is not supported by the enterprise may violate corporate
security policies and may pose a risk to the organization’s
compliance with regulations related to data security.
Action Item: Set strict controls for access to business data.
For many organizations, refusing to allow employees to use the
technology they prefer in the workplace is not a sustainable
approach to security. Still, not all devices are appropriate for
everyone in the enterprise. Do all employees, from the C-suite
down through the organization, need access to all business
data on their smartphones? It is unlikely. Businesses should
ask tough questions about who truly needs such access, since
there is benefit in limiting borderless access to information.
Start conservatively by restricting as much access as
possible, and then relax requirements on a case-by-case
basis. In addition to restricting access by users, consider
limiting access by data—for example, some intranet pages
should be accessible to everyone using an approved
smartphone, while certain customer relationship management
(CRM) applications should not be accessible at all through
this vector. Talk with your security vendor about solutions
designed to help protect the company’s network and data,
regardless of what device an employee uses to gain access
to the corporate network.
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Cisco 2010 Midyear Security Report
5
on conversations, steal personal
information from phone directories, and
even track a user’s whereabouts.5
Many criminals will likely spend little time
on individual users, though, and instead
focus on using their mobile devices
as a way to gain access to corporate
networks, compromise hosts, and harvest
sensitive business data (see Insight from
the Security Researchers: Hackers Are
Choosing Their Own Adventure, page
20). Cybercriminals are more focused
today on overcoming network security
than simply defeating a device—the goal
is to get into the network and stay there for
as long as necessary or possible.
Mobile devices represent just one
potential inroad into the network for those
intent on doing harm. There are more
worries for businesses than smartphones:
Every connection point is vulnerable—
from rogue hotspots to insecure service
providers, including webmail, application,
portal, and cloud service providers.
Complicating matters is that many
devices are now capable of sharing data
with each other wirelessly, and with little
effort on the part of users to make a
connection.
Wi-Fi Direct technology, for example,
built into many consumer devices now
entering the market, allows consumer
devices to establish connectivity through
Wi-Fi, other devices (including peripheral
devices, like printers), or another network
without any setup—or even to create a
Wi-Fi “hotspot.” Essentially, every supported device becomes a mini access
point that can connect with other Wi-Fienabled devices within a 300-foot range.
These ad hoc connections are convenient
for end users, but they create obvious soft
spots for data security—and underscore
IT’s challenge in maintaining adequate
visibility into and control of the highly
populated and active endpoint landscape
in the enterprise. It should be noted that
the Wi-Fi Direct specification contains
security features to prevent peer-to-peer
devices from compromising corporate
networks.6 Still, the onus is on enterprises
to make sure that WPA2, an encryption
technology that protects data flowing
between Wi-Fi radios and access points,
is enabled on the network.7
Risk Alert:
IP-Addressable Devices:
Who’s Listening to Your Network?
The concept of a “networked refrigerator”
that’s connected to the Internet may seem
like a running joke among watchers of the
Internet’s infiltration onto a host of devices,
but at a time when cars with Internetenabled dashboard screens are being
introduced, the idea of more and more
business devices that can communicate
on a network doesn’t seem so far-fetched.
And as wireless devices beyond the
usual desktop and laptop computers start
connecting to corporate networks, the
threat window only grows: Criminals need
to find only a single unguarded “in” to
begin snooping into a network.
It is not difficult to find the open doors.
Wireless printers, for example, which are
now commonplace in the enterprise, can
retain digital images—a potential boon for
data thieves. And what about the digital
camera that can seek a connection to a
laptop that happens to be connected to a
corporate network? The camera and the
laptop establish a wireless connection,
making it possible for the user of the
digital camera to “leapfrog” directly into
the corporate network. The data being
passed between wireless devices is also
vulnerable, and could easily be hijacked
and used inappropriately.
The variety of endpoints that are capable
of being connected, or are already
connected, is astonishing.
This interconnectedness will escalate, as
will the effects it will have on our networks.
In just a few years, every door lock, card
reader, video camera, vehicle, power meter,
and light switch will have an IP address—
at least in the business world. Therefore,
from a security standpoint, it will become
increasingly important—within the
enterprise and within our homes (since
many of us are now mobile or remote
workers, too)—to segment and firewall
different classes of devices in a network.
Enterprises also should keep in mind
that their “smart” office devices can be
sources for data loss in other ways—
no wireless connectivity required. For
instance, data thieves may only need to
make a small investment in a few used
digital copiers to reap a big return in their
hunt for sensitive data: An investigative
report by CBS News showed how easy
it is to retrieve tens of thousands of
documents from digital copiers that have
not had their hard drives sanitized prior
to resale. Among the information found:
Design plans for a building near “Ground
Zero,” the site of the 9/11 terrorist attacks
in Manhattan, and 95 pages of pay stubs
with names, addresses, and Social
Security numbers for employees of a
New York construction firm.8
5 “Smart phone under threat of attacks,” by Alexey Kushnerov, TheTicker.org, March 1, 2010, www.theticker.org/about/2.8220/smart-phone-under-threat-of-attacks-1.2174454.
6 “New Wi-Fi Direct Gets Peer-to-Peer Connections,” by David Coursey, PCWorld.com, October 14, 2009, www.pcworld.com/businesscenter/article/173669/new_wifi_direct_gets_
peertopeer_connections.html.
7 Wi-Fi Alliance FAQs, www.wi-fi.org/knowledge_center_overview.php?type=2.
8 “Digital Photocopiers Loaded with Secrets,” by Armen Keteyian, CBS News, April 15, 2010, www.cbsnews.com/stories/2010/04/19/eveningnews/main6412439.shtml.
6
Cisco 2010 Midyear Security Report
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
What’s Disrupting the Enterprise? Mobility
Data is on the move like never before. According to the Cisco
Visual Networking Index (VNI) Global Mobile Data Forecast,
2009–2014, mobile data traffic will continue to double every
year through 2014 (with video, the bandwidth hog, representing
more than 66 percent of the world’s mobile data traffic).9
Moving that data: smartphones and portables (91 percent),
according to Cisco research.
Data transcending borders and boundaries can undermine
even the best-laid plans for corporate security. Currently,
however, most enterprises mold their mobile security strategies
around compliance measures—such as United States (U.S.)
requirements like the Health Insurance Portability and
Accountability Act (HIPAA) and Payment Card Industry Data
Security Standard (PCI DSS)—relating to how personal
information, both stored and in motion, is protected by
businesses.
Government regulations, the lawsuits, fines, and reputational
damage that can result from noncompliance, and security
breaches are all significant motivators, of course, but companies need to think beyond these requirements if they want to
embrace mobility fully as a way of working and exchanging
information. Compliance does not equal security—nor does
it take into account all sensitive information that an enterprise
may want and need to protect.
Action Item:
Create a formal corporate policy for mobility.
Step 4: Educate the workforce. Communicate—and
enforce—the policy across the organization. But keep in mind
that secure mobility is not just about enforcing acceptable-use
policies from a human resources or legal standpoint: It’s also
about the safety of the network.
Step 5: Manage the device life cycle. You may not be able
to manage every mobile device in the enterprise, but you can
inventory every device you do control. Note the level of access
of the user. Can the user access sales figures, personnel
files, or customer data? Through this process, create a record
of who is accessing what information, with what device (or
application), and for what reason.
In addition, make sure you have the ability to lock and/or wipe
clean a device automatically and remotely after employment
termination or if a device is lost or stolen—a critical security
measure. Consider the example of an HR department staff
member who loses a device with employees’ personally
identifiable information saved on it. That data, once exposed,
could be used inappropriately by identity thieves and can
create serious legal and disclosure woes for the company.
Mobile security also needs a system-level approach that goes
beyond setting acceptable-use policies. Enterprises should
implement tools that allow visibility into wireless environments
and detect security threats as they emerge so they can take
swift action.
Step 1: Find out how mobility is happening in the corporate environment—and why—to build appropriate
security parameters. Understand what the business value
of mobility is for the enterprise. The approach will vary by
company and industry (for example, an educational institution’s
security concerns around mobility are likely to be quite different
from those of an energy company with a nuclear facility).
Step 2: Create an acceptable-use policy that outlines
the devices that are supported by the enterprise. Outline
what disciplinary actions may result due to noncompliance
with corporate policies relating to the use of mobile devices.
Explain why certain devices are not permitted in the enterprise
(and if/when that policy might change).
Step 3: When crafting a policy, keep in mind that it
should be flexible enough to cover both immediate and
future security concerns. Take into consideration what the
organization might need to compete in the future and attract
top talent—particularly from the very mobile, very connected
Generation Y.
9 Cisco Visual Networking Index (VNI): Global Mobile Data Traffic Forecast Update, 2009–2014, www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/
white_paper_c11-520862.html.
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Cisco 2010 Midyear Security Report
7
The Economic Shift:
Virtualization of Operations
When news about the virtualization of commonly used business solutions
makes the front page of major newspapers’ business sections on a regular
basis, it’s time to acknowledge that this trend is having a significant impact
on the enterprise.
This is largely good news. Businesses
can afford to gain access to services
they might not otherwise be able to
purchase as on-premises solutions.
They can free up capital to use for other
parts of the business. They can make
greater strides toward “going green,”
reducing office square footage and
travel costs. And workers don’t need to
be in the office to access the systems
they need to be productive.
The downside of virtualization of business
solutions lies in the security of the data.
Where is information going and who has
access to it? How strong are access
controls? What protections are built-in to
prevent breaches?
8
Cisco 2010 Midyear Security Report
However, this type of virtualization does
offer some resiliency that may aid security.
For instance, if the workplace is disrupted
because of an attack on systems or
structures (at the farthest end of the scale,
a terrorist attack), employees can continue
with day-to-day operations from anywhere
they happen to be—assuming, of course,
the cloud infrastructure itself wasn’t
attacked. Since data is not resident on end
devices, such as laptops or smartphones,
theft or loss of equipment isn’t as dire a
scenario for businesses. In addition, building
scalable policies around upgrades is easier
in the cloud environment. (See page 9 for
key questions to ask when adopting the
use of cloud computing solutions.)
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
What’s Disrupting the Enterprise? Virtualization
As with consumer devices, virtualization invites enterprises to
grant visibility and data access to a wide swath of workers, and
often, customers and partners. Enterprises must learn how to
manage this new twist on technology and available assets.
The way to mitigate the potential risks of virtualization is to
ensure granular, per-user application and data policies are
enforced on virtualized systems. Vulnerability management
can help ensure that easy-to-fix security gaps aren’t ignored,
and disaster/continuity planning can help make use of virtualization’s advantages for keeping an enterprise operational.
From a security and data protection standpoint, virtualization
demands that enterprises change their perspectives toward
identity, compliance, and data. To address disruptive trends
such as mobile device adoption, the borderless enterprise,
software virtualization, and the concept of “any device,
anywhere, anytime,” enterprises must implement:
Action Plan for Adopting
Cloud Computing
Businesses are allowing many audiences—employees,
partners, vendors, and customers—to benefit from working
with solutions based on the cloud computing model. Below
are some basic steps to take, and questions to ask, when
bringing these solutions into your business.
n
Assess your organization’s overall understanding of cloud computing.
•
Discuss functionality and risks.
•
Assess current policies and operating practices.
n
Ask the basics first: Why cloud computing?
•
Understand business drivers propelling you towards
cloud computing.
•Identity life-cycle management, “persona” reconciliation,
and authentication convergence planning capabilities
•
Will sensitive data or business operations be hosted in
the cloud? If so, why?
•Data-centric policy shifts, such as greater focus on
understanding data in motion and data governance
•
Develop a preliminary risk outline to work and build on.
•Software and asset management, identity-enabled
networking service/platform cost control and recovery,
and service management models
n
•Secure access for partners, as more businesses
outsource core business functions to outside organizations
It’s also a good idea to negotiate comprehensive service
level agreements (SLAs) with cloud providers and retain
the capability to audit those services as necessary.
Action item:
Invest in tools to manage and monitor cloud activities.
Outline a solid communication, awareness, and education plan.
•
Develop custom sessions for executives, plus general
content for all employees.
•
Establish a “Cloud Board” of business and technical
leaders to work through adoption strategies.
•
Avoid organic growth models that are cumbersome
to operate, scale, or secure.
•
Measure consumption trends and determine
risk tolerance.
Virtualized platforms do allow for new avenues of data loss;
for instance, a virtualization administrator can perform certain
actions, such as removing data or shutting down virtual
machines, without the enterprise being aware. In the old
“physical world,” these types of activities would have required
the addition of hardware devices, or the installation of software
on the operating system itself.
While some loss of control over data is inevitable with
virtualization, businesses should take advantage of technology
that provides some visibility into systems not based entirely
on-premises. Solutions on the market include those that
offer “health checks” and performance dashboards to help
IT manage cloud services. Organizations also should
schedule yearly reviews of where data resides.
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Cisco 2010 Midyear Security Report
9
The Demographic Shift:
The Role of Collaboration and Social Networks
It’s important to understand how prevalent—and valuable—social networking is to today’s workforce. In particular,
the “millennials”—people defined as 30 years old and younger, often referred to as “Generation Y”—may be
spending less time using traditional business tools like email in favor of social networks. In its recent report on
millennials’ use of technology, management consulting, technology services and outsourcing company, Accenture,
found that younger millennials spend slightly more than four hours a week on work-related email, compared to
almost seven hours a week for older millennials. (While the study didn’t address older workers, one can reasonably
assume that workers in their 30s and 40s spend well over seven hours a week on email.) Instant messaging and
texting, often via social networks, are replacing email as the favored communications tool for this generation.
Accenture also found that millennials
make heavy use of social networking sites
while on the job, whether their employers
allow them to or not. According to the
report, 45 percent of employed millennials
use social networking sites when they’re
at work, but only 32 percent say that this
use of social networks is supported by
their IT departments.
well as employees from organizations
around the world. The study reported that
50 percent of end users admitted that
they ignore company policy prohibiting
use of social media tools at least once a
week, and 27 percent said they change
the settings on corporate devices to
access prohibited applications.
400 million active users, and that number
is projected to grow to 1 billion by the
end of 2010. Recognizing that the
enterprise market is a lucrative one, social
media companies are introducing tools
specifically designed for this audience.
An instant-gratification workforce is
emerging: Generation Y was raised with
mobility at their fingertips, and IT needs
to adapt its strategies accordingly (as
online criminals will).
A similar survey from Cisco also found
that when workers want access to social
networking technologies, they’ll get it—
even if it means circumventing corporate
policy. The Cisco “Collaboration Nations”
study surveyed IT decision-makers as
At the same time, social networks like
Facebook, first colonized by college
students, are exploding in population and,
not surprisingly, have become places
to conduct business. Facebook has
an audience that continues to grow at
exponential rates: The site currently has
10
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Cisco 2010 Midyear Security Report
Social Media for Enterprises:
Upside and Downside
Social media has become both a groundbreaking collaboration tool for enterprises
moving toward the borderless network
and a prime venue for the launch of attacks
against individuals in the business. The
Enterprise 2.0 trend may be cause for
cheering from workers who embrace
social networking tools, but it can lead
to sleepless nights for executives who
believe it opens the door to data loss,
hacking, and reduced productivity.
Attempts to steal data launched via
social media certainly pose enough of
a threat to businesses—as any user of
social networking sites has undoubtedly
noticed, their friends and family members
seem to spread malware inadvertently
on a regular basis. And as data theft
attempts launched via email become less
successful, criminals continue to focus
their attention on social media. According
to data compiled by ScanSafe, now part
of Cisco, less than 1 percent of malware
encounters in enterprises in 2009 were
driven by users clicking links in webmail.
In the first quarter of 2010, this number
rose to 1.4 percent. This likely indicates
that users are more cautious about
responding to suspect email, and that
email filters are doing their job.
Many enterprises, fearing the spread of
malware and productivity losses, have
clamped down on use of social media
networks (as well as instant messaging) in
the workplace, even though workers want
access to them. According to ScanSafe
data, 64 percent of ScanSafe’s customer
base blocks access to social networking
sites for 50 percent or more of their staff.
It’s 3 p.m.—What Are Your Employees Doing? Tending Their Virtual Fields
According to Cisco data examining how its customers’
employees use Facebook, 7 percent of Facebook users
spend an average of 68 minutes per day playing the popular
interactive game FarmVille. Mafia Wars was the second most
popular game; the 5 percent of employees who play Mafia
Wars rack up 52 minutes of play daily. Café World, another
popular game, is played by 4 percent of Facebook users for
an average of 36 minutes per day. (See the chart below for
statistics on other applications.)
While there may not be an immediate security risk in gameplaying, it’s safe to assume that online criminals are developing
ways to deliver malware via popular applications. Heavy users
love to search the web for cheats and tricks for better play, so
they may fall victim to malware-laden links or spam messages
offering such shortcuts.
However, if enterprises respond to this threat by banning all
access to social networking sites, they may damage workers’
ability to collaborate and communicate in a changing business
These numbers raise the question of whether enterprises
environment. “Businesses must balance the need to provide
should limit access to these interactive games, and by
access to collaboration tools with the need to manage
association, the social networking sites on which they operate. enterprise security,” says Christopher Burgess, senior security
advisor at Cisco. “The smartest
solution is to create explicit
Facebook
Average browse time
policies governing the use of
Application
per user per day (min)
certain features, such as games,
FarmVille
68
within social networking solutions.
In addition, businesses need to
Mafia Wars
52
be aware of exactly how and
Café World
36
where workers are using such
Treasure Isle
19
features.”
Zoo World
18
Mind Jolt Games
13
Country Life
11
Restaurant City
11
FishVille
10
PetVille
Data from April 2010
10
Source: Cisco Security Intelligence Operations
How can enterprises minimize
the threats that arise from the
introduction of social media into
the business? The best tactic
is to develop a corporate social
media handbook that includes
information security policies and
codes of conduct.
Interactive games have proven popular with Facebook users. Enterprises should set guidelines
for where and how employees may access such games at work.
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Cisco 2010 Midyear Security Report
11
What’s Disrupting the Enterprise? Social Media
Employees are pushing the boundaries of acceptable use
of social networks and are slowly convincing even the most
conservative enterprises that judicious use of these networks
can benefit the business. But where, and how, are lines drawn?
For instance, enterprises may ban employees outright from
using social media networks that offer messaging or chat,
even though more and more business takes place via these
messaging systems. If, for example, a company discovers
that its customers and partners routinely use Facebook to
stay in touch on projects, how does the business allow such
access without giving workers free rein to distribute sensitive
corporate information via these networks?
Businesses are slowly recognizing the power of social
networking, but they haven’t been quick to establish structures
for its safe and secure use. A recent study sponsored by
Cisco and conducted by leading business schools in Europe
and the United States showed that organizations are lagging
in governance and IT involvement when it comes to their
social networking strategies:
•Only one in seven of the companies participating in the
study have established formal processes for adopting
social networking tools for business purposes.
•Only one in five businesses said they had policies
in place for the use of social networking tools.
•Only one in 10 survey respondents said their IT departments
had direct involvement with social media initiatives.
Action Item:
Provide employees guidance.
Ideally, businesses would create policies that cover every
possible incidence of social media use (and abuse). However,
creating comprehensive policies may not be realistic, since
the impact of social networking is still unfolding.
At minimum, enterprises should institute a process for allowing
questions about social media usage to be directed to the
correct decision-makers in the organization—in the absence
of an environment that welcomes discussion, employees may
make bad decisions that impact corporate security.
•Social networking tools are making their way into many
parts of organizations, such as human resources, marketing,
and customer service. Small- and medium-sized businesses are using social networks for lead generation.
12
Cisco 2010 Midyear Security Report
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Worldwide Government Trends:
The Impact on Business
As organizations adapt their security strategies to meet new
and emerging technologic, economic, and demographic
challenges, they also must acknowledge another powerful
force: globalization. This, too, is having a significant impact
on how and where business is done, and it’s influencing
security practices.
Multinational organizations, or those looking
to do business on the global stage, must
navigate the complexities and balance
the demands of differing standards and
attitudes toward security issues such as
data loss protection and privacy in the
various countries where they conduct—
or want to conduct—business. If an
enterprise adheres to certain standards
in its primary markets of operation, will
it be willing to make the effort to tighten
the rules if it moves into a market where
standards are more stringent—or
con­versely, loosen them, and perhaps
put security and privacy at risk, in a
market where standards are more lax?
Take, for example, the acts against major
businesses, including Google, that are
alleged to have occurred mid-to-late last
year. These actions, dubbed “Operation
Aurora,” involved a botnet that compromised computers in an effort to steal
corporate information and break into
email accounts. Google reported theft
of its intellectual property and also said
that Gmail accounts of prominent human
rights activists had been attacked.
Google executives, also unhappy about
China’s ongoing censorship of search
engine results, announced in March that
they would begin redirecting Google
users in China to uncensored search
results using servers based in Hong Kong.
As of mid-March, business repercussions
of this decision were becoming evident:
According to The New York Times, China
Mobile, the company’s biggest cellular
company, would cancel a promotional
deal placing a link to Google on its mobile
Internet homepage. But the story has no
clear ending—as this report went to press,
Google said it was responding to threats
from the Chinese government to revoke
its operating license by changing (yet
again) its approach to dealing with
Chinese users.
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Multiple Governments,
Multiple Stances on Security
The differing standards among countries
for maintaining the security of corporate
data can be a source of frustration for
businesses. Many countries are concerned
with the effects on economic and national
security arising from cybersecurity.
Policymakers across the globe are trying
to find approaches to security that both
protect the assets of their citizens and
function globally. This conversation will
continue for some time, but enterprises
should be aware that policymakers
may issue conflicting requirements.
Businesses should recognize this
challenge and work globally to ensure
consistent policies that protect and
encourage innovation.
Cisco 2010 Midyear Security Report
13
To the extent that enterprises are subject
to nonstandard requests from the govern­
ments of countries with which they do
business—like the request to use
nonstandard encryption—organizations
must decide if they will consent to these
demands, and how they will protect their
customers and employees from possible
data breaches if they do so.
There are signs that governments may
band together to add some cohesion to
the varying security and privacy standards
across borders—especially since the
rise of country-specific security requirements threatens to fragment the global
interoperability of the Internet. Common
Criteria is a set of security standards that
many countries and enterprises (including
Cisco) have adopted to enforce security
standards while striving to attain global
interoperability. And in March, British
lawmakers called for a Europe-wide
approach to cybersecurity instead of
ad hoc fixes country by country, as “the
collapse in cybersystems in one country
can overlap in others.”10
Global Security Guidelines:
Should Business Become
a Player?
It’s not only the U.S. government that is
prioritizing cybersecurity. Governments,
aware of the national security implications
of critical infrastructure assets owned
and operated by the private sector, are
beginning to encourage more privatepublic sector security cooperation.
Private entity assistance is particularly
valuable for organizations that are working
to establish standards across borders.
For instance, global nonprofit Internet
Corporation for Assigned Names and
Numbers (ICANN), which assigns the
Internet’s domain names and IP addresses,
has a Government Advisory Committee
consisting of local government representatives, as well as task forces comprised of
relevant businesses, such as networking
companies and equipment vendors.
officers from leading San Francisco and
Silicon Valley area businesses (including
Cisco), is already stepping up this
information sharing.
The U.S. federal government is reaching
out to the private sector to develop
standards as well. In March, U.S. Chief
Technology Officer Aneesh Chopra
emphasized the need for collaboration
between the government and private
sector in a blog post on the Office of
Science and Technology website. He
wrote, “It is more important than ever that
federal agencies work effectively with the
private sector to ensure that meaningful
standards can be in place to meet urgent
national needs.” He added, “The right
starting point is to ensure that federal
agencies work closely and effectively
together to define their standards needs,
define their approach to working with
industry and standards organizations,
and support their meaningful adoption
by markets.”11
“When an advanced persistent threat
(APT) attack occurs, many members are
on the phone with one another three times
a week rather than for just their regular
monthly teleconferences,” reports Dark
Reading. The council is also creating an
online portal where members can record
data about attacks and threats, hopefully
correlating information and sharing advice
on defensive tactics.
One issue to consider when implementing
these partnerships: If an enterprise
partners with one government, it may lose
out on business from another country
because they may believe the business
would relay sensitive information between
countries. In addition, a business’s own
customers may suspect that the enterprise
is getting too close for comfort with
government officials, and may be sharing
private cus­­tomer data. These perceptions need to be managed directly and
pro­actively if businesses intend to
proceed with certain types of government partnerships.
There’s another twist to the security
partnership angle: the idea of enterprises
creating information sharing committees
(ISACs) to share more information about
the threats they encounter. This is not a
new concept, but it’s one that should take
on more urgency as threats increase.
After all, the miscreant community is
collaborating. According to the Dark
Reading security news web portal, the
Bay Area CSO Council, whose members
comprise chief information and security
U.S. Government Update
Over the past year and a half, businesses
of all types have been monitoring the
Obama administration’s progress on
strengthening U.S. national cybersecurity,
wondering how they might benefit—or
perhaps be affected adversely—by new
rules and expectations set by the government. They also wonder what they may
be asked to change or provide to help the
president meet his ambitious goals.
There has been concrete progress on
several fronts since President Barack
Obama unveiled his cybersecurity plan
shortly after taking office in 2008. The
administration remains focused on
cybersecurity issues, and it can be said
that cyberdefense in the U.S. government,
and in the country at large, is improving.
There is increasing transparency, for
example, with more reporting of threats,
intrusions, and hacking incidents related to
unclassified systems. Just as in the private
sector, however, the threat of cyberattack
remains a significant issue for government.
Director of National Intelligence Dennis
Blair, who stepped down from his post in
mid-May, highlighted the issue for the U.S.
Congress earlier this year, indicating that
the nation’s computer networks remain
vulnerable to intrusion or disruption, and
that criminals are stealing information from
the government and private sector every
day. He told lawmakers, “Malicious
10 “Europe ‘vulnerable to cyberattack,’” by Bobbie Johnson, Guardian.co.uk, March 18, 2010, www.guardian.co.uk/technology/2010/mar/18/europe-vulnerable-to-cyberattack.
11 “Providing Leadership on Standards to Address National Challenges,” by Aneesh Chopra, Office of Science and Technology Policy blog post, March 24, 2010, www.whitehouse.gov/
blog/2010/03/24/providing-leadership-standards-address-national-challenges.
14
Cisco 2010 Midyear Security Report
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
cyberactivity is occurring on an
unprecedented scale with extraordinary
sophistication.” Blair also referenced the
Operation Aurora incident in 2009 (see
page 13) as a “wake-up call” for U.S.
officials. He emphasized that “cyberspace
[cannot be protected] without a
coordinated and collaborative effort
that incorporates both the U.S. private
sector and…international partners.”12
While the Obama Administration’s efforts
to create a national cybersecurity plan
have been considerable, continued development has slowed as debate continues
over authorities, roles, and responsibilities
between the public and private sectors.
There has been increasing dialogue
between private industry and the
govern­ment about improving U.S.
cybersecurity—both domestically and
globally. Cyber­security coordinator
Howard Schmidt wrote on the White House
website in March 2010: “In order to be
successful against today’s cybersecurity
threats, we must continue to seek out
innovative new partnerships—not only
within government, but also among
industry, government, and the American
public.” President Obama appointed
Schmidt as the first White House cybersecurity coordinator in December 2009.
His choice of Schmidt, who has 40 years
of experience in government, business,
and law enforcement, was well received
by cybersecurity professionals.
Another high-profile initiative by the
Obama administration starting to take
shape is the U.S. Cyber Command (U.S.
CYBERCOM). Part of the Department of
Defense, CYBERCOM’s purpose is to
protect military networks against malicious
cyberattacks. President Obama’s nominee
for the first U.S. CYBERCOM commander,
Army General Keith B. Alexander—who
also leads the U.S. National Security
Agency (NSA)—was appointed in late May
2010 and given a fourth star. His
appointment officially established the
initial operating capability for the new
command, which should be fully
operational by the end of this year.
About 2500 personnel are expected to
be hired and positioned, primarily at Ft.
Meade, Maryland, where U.S. CYBERCOM
is located and the NSA is based.
One concern expressed when General
Alexander was nominated to lead
CYBERCOM was that he is also the
director of the NSA, and would therefore
assume a “triple-hatted” role because he
also leads the Central Security Service.
However, General Alexander told the
Senate Armed Services Committee in
April 2010 that if confirmed for the top
role at CYBERCOM, he would not try to
“militarize cyberspace” and would focus
on safeguarding the integrity of the
military’s critical information systems. In
addition, he pledged that he would work to
protect the privacy rights of Americans.13
Meanwhile, cybersecurity-related hiring
at the Department of Homeland Security
(DHS) has been slowly increasing, as
last fiscal year it was given more than
US$385 million for new personnel. The
DHS has been working to locate available
talent and has been aggressively seeking
candidates from outside the government
because there simply aren’t any existing
personnel to spare—and getting clearance
for those they do hire is a lengthy process
(as long as 12–18 months for certain
positions). The DHS is also exploring
hiring existing contractors for full-time
cybersecurity roles.
Privacy Issues Moving
to the Forefront
In the year ahead, expect the discussion
around civil liberties and privacy issues to
intensify in the United States, in particular,
as the country takes a more defensive
posture with its cybersecurity. Why
should the private sector pay attention?
Because they may end up doing the
“heavy lifting” on these issues, with the
U.S. Congress and the American public
asking what companies are doing to help
protect against the erosion of citizens’
privacy, while also doing their part to help
strengthen national cybersecurity.
Meanwhile, businesses have been airing
their concerns to the government about
privacy, but from a different angle—
specifically, how disclosure about an
attack can undermine their competitive
edge and damage their reputation. At the
RSA Conference in March 2010, U.S.
Federal Bureau of Investigation (FBI)
Director Robert Mueller pledged “minimal
disruption to business with protective
orders and increased privacy for U.S.
corporations who suffered data breaches,
in order to avoid loss of reputation and
brand—despite the momentum of federal
and state data breach disclosure laws.”14
He said, “Notifying the authorities may
harm your competitive position. We
will minimize the disruption into your
business. We [will] work together to limit
the breadth and scope of [the] attack.
For every investigation in the news, there
are hundreds that will never make the
headlines. Disclosure is the exception,
not the rule.”15
“The government is not going to secure the private sector.
[But] we are making sure our private sector partners have
more security as part of what we are doing.”
—Howard Schmidt, U.S. cybersecurity coordinator
12 “Annual Threat Assessment of the U.S. Intelligence Community for the Senate Select Committee on Intelligence,” testimony to the U.S. Congress by Dennis C. Blair, Director of National
Intelligence, February 2, 2010, www.dni.gov/testimonies/20100202_testimony.pdf.
13 “NSA Director Says Cyber Command Not Trying to Militarize Cyberspace,” by Brian Prince, eWeek.com, April 15, 2010, www.eweek.com/c/a/Security/NSA-Director-Cyber-CommandNot-Trying-to-Militarize-Cyberspace-602442/.
14 “RSA: FBI Director Calls for Action Against Cyber Threat,” by Stefanie Hoffman, ChannelWeb, March 5, 2010:
www.crn.com/security/223101709;jsessionid=QXDPJJJQFNI0VQE1GHRSKH4ATMY32JVN.
15Ibid.
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Cisco 2010 Midyear Security Report
15
Taking Action
to Reduce Innovation Gaps
To date, governments and law enforcement worldwide have been making
slow progress on improving cybersecurity and increasing the fight against
cybercrime. Meanwhile, cybercrime continues to grow: Last year, in the
United States, the total loss linked to online fraud was US$559.7 million—
up from US$265 million in 2008.16
Why are cybercriminals so successful?
In their shadow economy, just as in the
commercial business world, those who
move fastest and use technological
innovation to their advantage succeed or
displace the competition (see Criminals
Now Protecting Their Intellectual
Property, page 17). It’s simple Darwinism:
The most agile survive.
For all the innovation in adopting technology
in the private sector, in some areas
criminals move even faster. While many
legitimate businesses are still weighing
the benefits of embracing social networking
and peer-to-peer technologies,
cybercriminals were early adopters of
these innovations and are using them
not only to commit crime, but to enhance
their communication, refine and promote
their areas of expertise, and speed their
transactions with each other.
In Russia, for instance, social networks
were used to create an online marketplace
for stolen credit cards. This has allowed
the “sellers” to specialize in areas such as
acquisition, while the “buyers” focus their
efforts in exploitation. In addition, terrorists
worldwide are using social networks to
organize, recruit, and learn; military
analysts call this “open-source warfare.”
There is also another type of “innovation
gap”: the gap between how quickly criminals
can innovate to exploit vulnerabilities
and the speed by which businesses can
innovate to protect their systems. It is
critical to recognize just how rapid the
cybercriminals’ development and
deployment cycle is. They don’t have
to answer to shareholders, laws, or
regulations. In fact, a major part of their
role is to find ways around established
systems, policies, and protective controls.
There is no need to spend hours in the
research and development phase making
sure their results are proof-positive. If
something works, they will run with it.
16 “IC3 2009 Annual Report on Internet Crime Released,” media release, March 12, 2010, The Internet Crime Complaint Center (IC3), a partnership between the FBI and the National White
Collar Crime Center (NW3C), www.ic3.gov/media/2010/100312.aspx.
16
Cisco 2010 Midyear Security Report
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Malicious technology often can be
deployed in hardware or software products
as soon as it’s developed. (Consider
how many times we have witnessed the
compromise of a product on the day it is
released.) For the software industry,
specifically, closing the innovation gap
means making sure security is factored
into the development cycle, with every
effort made to detect and eliminate
vulnerabilities in products before they
are released so they are as secure as
possible when introduced to the market.
For enterprises, an important first step
toward bridging the innovation gap is to
harden their security through a renewed
focus on security basics, says John
Stewart, vice president and chief security
officer of Cisco. “One reason why many
hacking scenarios succeed is because a
critical element of a network or an individual within a network is trivially compromised,” he explains. “Part of the ‘innovation
gap’ is that organizations are just fighting
the latest threats—focusing on whatever
is the shiniest object in the security threat
landscape—instead of staying on top of
old and current problems that remain
popular paths of attack for criminals.”
know exactly what type of information to
provide to law enforcement to help them
track down and prosecute cybercriminals.
To reduce the innovation gap, Stewart
recommends that enterprises:
While many leading companies are taking
a more proactive approach to security,
others continue to view it as an afterthought.
Too often, C-level executives are allowed
to label security as “IT’s problem.”
•Move faster to implement new technology when needed instead of hanging
on to outdated technology, hardware,
and software, simply because it’s
already in place.
•Measure the efficacy of security
controls: not only the technology, but
the combination of people, processes,
and technology in the organization.
But in the enterprise, security is everyone’s
problem. If business organizations don’t
embrace that mindset, the innovation gap
can never be bridged. “Malicious actors
only need to get it right once. But we have
to be right all of the time,” says Stewart.
In addition, businesses should take the
time to build a working relationship with
law enforcement, such as nonprofit
organization InfraGard (www.infragard.net)
in the United States, a private-public
partnership with the U.S. FBI, and in the
United Kingdom, the Police Central
e-Crime Unit of the Metropolitan Police
(www.met.police.uk/pceu/). Enterprises
need a “go-to” team in the event of a
cybersecurity incident, and they should
Criminals Now Protecting Their “Intellectual Property”
However cutting-edge and entrepreneurial you believe your
business is in terms of technology and security, remember
one thing: The criminals who prey on business online are
trying to always be a few steps ahead of you. Witness the
trend of creators of malicious software placing tough
anti-piracy protections on their creations, in a bid to keep
other criminals from stealing their intellectual property.
The latest version of the builder kit for the Zeus banking
Trojan, which has long been a threat to financial institutions
and delivers lucrative personal information back to a botnet
command-and-control server, includes the type of copy
protection one would normally find on a sophisticated piece
of enterprise software. The creators of Zeus have added a
hardware-based licensing system to the Trojan builder kit,
which only allows the kit to be copied on a single computer.
also includes a hardware lock, using VMProtect, a Russian
commercial software protection package,” reports the Krebs
On Security blog.
It’s sobering news that criminals are quickly meeting and even
exceeding the safeguards that legitimate enterprises build
into their products—yet another sign that the sophistication
and business acumen of online criminals knows no bounds.
Also of concern is the fact that protected malware code and
software can be harder to reverse-engineer, and therefore,
more challenging for enterprises and their security vendors
to develop ways to halt it.
The creators of a competing malware kit, SpyEye, which
appears to be trying to gain market share from Zeus, have
also decided to protect their technology. “Not to be outdone
[by Zeus], the SpyEye author now claims his malware builder
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Cisco 2010 Midyear Security Report
17
The Spread of IPv6 and
Domain Name System Security
Thanks to its explosive growth, the
Internet is running out of IP addresses
that were established under the
IPv4 protocol, created 35 years ago.
(IP addresses have traditionally been
represented by four sets of numbers,
such as 192.168.1.1.) Current predictions
call for IPv4 addresses to be depleted
by 2011 or 2012. The solution is the new
IPv6 protocol, which will allow for substantially more IP addresses, thus providing
trillions upon trillions of new addresses,
dramatically increasing the ability to keep
up with the Internet’s growth.
Even though IPv6 has not been widely
deployed, there has been much security
testing and development of mechanisms
to secure the protocol. Many commercial
security testing tools have been updated
to support the IPv6 protocol; many
others have it on their road maps. Various
security concerns around IPv6 have
already been identified, such as insecure
neighbor discovery, tunneling, and
auto-configuration. Early security
research has led to the development
of the RFC 3971 Secure Neighbor
Discovery Protocol (SEND) and RFC
3972 Cryptographically Generated
Addresses (CGAs), which help mitigate
the weaknesses with the default
neighbor discovery process and are
not vulnerable to the same attacks.
One drawback, however, is that not all
devices support these new standards.
In mid-2009, Cisco Distinguished System
Engineer Eric Vyncke told Network World
that IPv6’s auto-configuration capabilities
can allow criminals to establish rogue
network devices that masquerade as
IPv6 routers. An IPv6-capable device
can automatically configure itself with a
local IPv6 address without being specifically configured for IPv6; this can open
up a new attack vector unbeknownst to
the user.
In addition, the process of shifting to the
IPv6 standard, including the development and deployment of IPv6-ready
security devices and networking equipment, may expose enterprises to exploits
because security vulnerability testing is
only in the beginning stages.
Combating the threat posed by IPv6 may
mean simply raising awareness among
IT staff that the process of switching to
the standard should not be done without
thorough testing and researching of
potential vulnerabilities. No business
should assume that because the new
standard is solving one problem, it isn’t
creating others.
Like IPv6, Domain Name System Security
(DNSSEC) promises to make life better
for individuals who, and businesses that,
rely on the Internet. But it also may raise
unrealistic expectations that it can solve
all the security “pain points” that plague
the online world. DNSSEC reduces the
chances for criminals to launch attacks
via DNS cache poisoning (a type of
“man-in-the-middle” attack), in which users
are redirected from legi­timate to malicious
websites without their knowledge.
DNSSEC uses public key cryptography
to create digital signatures that assure
web users they have been directed to
the correct IP address that corresponds
to the web address they typed into their
browser. Enterprises that embrace use
of DNSSEC should be aware that while
the standard promises to thwart a
troublesome type of online attack, it
will not solve all security challenges.
Risk Alert:
A “Perfect Storm” of
Technological Change
IPv4 address exhaustion and the move
to IPv6, the need to implement DNSSEC,
and the switch from 2-byte to 4-byte
Autonomous System Numbers (ASNs),
which marks a change to the Internet’s
inter-domain routing structure, will
ultimately change the way the Internet
functions. Any one of these changes
represents a significant architectural
and operational challenge for network
operators. Together, they create a
“perfect storm”17—described as “the
greatest and potentially most disruptive
set of circumstances in the history of the
Internet, given its growth in importance
to worldwide communications and
commerce.”18
Of course, this means that enterprises
are at risk as well. The question: Is your
enterprise prepared for the arrival of
these “multiple, simultaneous, and
large-scale changes”?19 The storm is
approaching fast—but organizations
have known for years that it was coming.
Therefore, your security team already
17 Worldwide Infrastructure Security Report, Arbor Networks, January 19, 2010, www.arbornetworks.com/report.
18 “Perfect Storm Threatens Telecom Networks,” by Carol Wilson, Light Reading, January 19, 2010.
19 Ibid.
18
Cisco 2010 Midyear Security Report
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Explosive Growth in Connected Devices and
Applications—Along with New Threats
The dramatic technology and security changes impacting enterprises are accelerated
by the projected growth in usage of mobile devices and applications. Unfortunately,
criminals don’t intend to allow their activities to lag behind this growth—security threats
are expected to multiply in tandem with the adoption of these devices and applications.
should be carefully planning for these
changes and making necessary updates
so they can help minimize the organization’s security exposure and ensure the
network infrastructure, from routers to
firewalls to switches to software, is
protected as the transition to each new
service occurs.
Expect to see many businesses preparing for the storm in the coming year.
They will likely need to expend a great
deal of time, money, and resources on
adapting to these significant changes,
which are inconveniently culminating
post-recession, when IT resources are
already limited at many organizations.
U.S. government organizations are
likely to be particularly preoccupied
with getting up to speed, as many
failed to comply with the December 31,
2009, deadline set by the U.S. Office
of Management and Budget to deploy
new authentication mechanisms (for
example, digital signatures for DNSSEC)
on their websites that would help prevent
hackers from hijacking web traffic and
redirecting it to bogus sites.20
As seen in the chart below, as of 2010, about five connected devices per person are in
operation worldwide—but that number will seem puny in 2013, when projections call for
a whopping 140 devices per person to be in operation globally. At the same time, security
threats will be on a similarly dramatic trajectory: from 2.6 million identified threats this year,
to 5.7 million in 2013.
1 Trillion
Connected Devices
1
Trillion
(140 connected
devices per person)
500 million
(1/10th of a connected
device per person)
35 billion
(5 connected
devices
per person)
Source: Forrester
Research, Cisco analysis
—forecast of 2013
assuming consistent
growth trends
1,500,000
total mobile
Applications
3000
total mobile
applications
worldwide
265,000
total mobile
applications
worldwide
Source: Windows
Mobile, Morgan Stanley,
Cisco analysis—forecast
of 2013 assuming
consistent growth trends
Security Threats
applications
worldwide
5,700,000
security threats
624,000
security threats
2,600,000
security threats
20 “80% of government Web sites miss DNS
security deadline,” by Carolyn Duffy Marsan,
NetworkWorld.com, January 21, 2010,
https://www.networkworld.com/news/2010/012010dns-security-deadline-missed.html?page=1.
2007
Source: Symantec,
Cisco analysis—forecast
of 2013 assuming
consistent growth trends
2010
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
2013
Cisco 2010 Midyear Security Report
19
Insight from the Security Researchers:
Hackers Are Choosing Their Own Adventure
If you want to understand how today’s hackers operate, think of a book that allows
the reader to select different storyline options to pursue at the end of each chapter.
According to Cisco threat research manager, Scott Olechowski: “They have a
specific target in mind when they break through the firewall. But once they are
inside, they think, ‘Now, where else can I go from here?’”
“Why do hackers succeed?
They’re lucky, they’re patient,
and they’re brilliant. They’re
also better funded than you.”
—John Stewart, vice president and
chief security officer, Cisco
20
Cisco 2010 Midyear Security Report
Olechowski also emphasizes that while
hackers may decide to explore at random
inside a network, their end goal is constant:
to collect as much valuable information
as possible, for as long as possible (see
Advanced Persistent Threats, page 22).
“It’s all about building a path in the network
that you can travel many times until you
have all that you want, or you are discovered—if you ever are,” he says.
Today’s hackers are usually doing a job for
someone else—and their contact, in turn,
may be working for someone else, and so
on. (This chain can lead to other companies
or even governments, not just an individual
or criminal organization.) Good information
always has “street value,” and an impressive
amount of money is likely to change hands
between those who steal data and those
who want it—from thousands to millions,
depending on what the information is, how
much there is, and who is funding the
operation. This is why the theft of
intellectual property is now garnering
more attention than ever from industry:
It has become a real threat to businesses’
continued ability to compete and
conduct commerce.
ScanSafe has been tracking malware
encounters in highly sensitive industries
for two years, and its research has
revealed—perhaps, not surprisingly—
that companies in the energy and oil,
pharmaceutical and chemical, government,
and banking and finance sectors are
being targeted by hackers and other
cybercriminals seeking intellectual and
corporate assets and government
intelligence. Targets for attack include
executives and other key employees
who have direct access to this type of
information (see The Downside of Being
a VIP (or Just Working for One), page 22).
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Kurt Grutzmacher, network consulting
engineer in the Cisco Advanced Services
Security Posture Assessment team, knows
well what today’s hackers are after—and
how they get to it. Cisco customers hire
the Security Posture Assessment team
to impersonate attackers and expose
vulnerabilities through penetration testing.
“Using common exploits, we try to crack
into the customer’s network and poke
around to see how deep we can go and
what we can find, from personally
identifiable information (PII) and financial
data to intellectual property, including
source code,” explains Grutzmacher.
The Security Posture Assessment team
looks for common security soft spots,
such as unpatched servers and easily
guessable account credentials. “If we
are coming into and then ‘sitting’ in the
network, we look specifically for the
weaknesses in account management,
such as easy-to-crack passwords and
IDs, unprotected databases, and web
applications that IT might not be aware of
or that have known weaknesses,” continues
Grutzmacher. “Organizations are usually
quite surprised by how much sensitive
data we can collect that they were
convinced was safe—or they thought
wouldn’t be of interest to a hacker.”
Grutzmacher calls the modern hacker’s
approach to breaking into a network and
stealing data the “Artichoke of Attack”: The
hacker chips away at the security armor
along the perimeter to get to the “heart”
of the enterprise. While Internet-facing
systems are usually very well protected
and boundary protections are typically
solid, persistent hackers—aided by a mix
of skill and luck—do eventually find a gap
in that hard-core exterior through which
they can enter and go where they please.
“You used to hear about hackers having to
peel away at the network’s ‘onion layers,’
but in the borderless environment, that
analogy does not apply,” Grutzmacher
says. “Hackers don’t have to peel away the
layers—they only need to remove certain
pieces. The bonus is that each little part
is tasty. And leaf after leaf, it all leads the
hacker to something even more tasty.”
“You used to hear about
hackers having to peel
away at the network’s ‘onion
layers,’ but in the borderless
environment, that analogy
does not apply.”
—Kurt Grutzmacher, network consulting engineer, Cisco
Passwords
Client-side
Attacks
Databases
Weak credentials are a boon to hackers,
who will “ride” the compromised
credentials as far as they will take them,
deeper into areas of the enterprise where
sensitive data resides, often with limited
or no security measures to protect it.
But it’s not always data that’s the prize.
Hackers sometimes gain control of large
parts of a computing environment by
seizing administrative access and taking
over an organization’s network devices,
Windows domain or UNIX databases.
There, they’ll wait and capture the day-today operations of the business, including
email communications, instant messages,
and websites visited by employees.
Web
Applications
Buffer
Overflows
The Artichoke of Attack:
Modern hackers chip away at the hard-core
exterior along the perimeter of the network
to get to the heart of the enterprise, removing
certain “leaves” to reveal sensitive data that
is either unprotected, or secured by weak
defenses, such as easy-to-crack passwords
and IDs.
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Cisco 2010 Midyear Security Report
21
Risk Alert:
Advanced Persistent Threats
Like the so-called “sleeper cells” that
plague those who fight terrorism,
persistent threats present a danger to
enterprises that have not implemented
ways to identify and stop these security
challenges. Instead of constant, “noisy”
attempts, persistent threats favor a
“low-and-slow” approach. This type of
exploit may center on malware that, once
lodged in the network, communicates
only infrequently with its command-andcontrol networks to evade detection,
or uses social networks and other
hard-to-filter means to communicate
inconspicuously.
“Advanced persistent threats” or APTs are
launched by skilled attackers whose goal
is to cause severe economic disruption to
the business and to gather intelligence in
a targeted manner. For instance, they may
seek anything from competitive bids to
natural resource contracts to engineering
documents. (Operation Aurora, discussed
on page 13, is an example of an APT.)
Because these threats are designed to
remain under the security-detection radar,
the intruders intend to return repeatedly
to a specific target, stealing more information. These attacks are also adaptive,
meaning they will change tactics based
on your defenses. This is not a “smashand-grab” crime—it is a well-planned,
long-term scheme to separate a business
from its money or intellectual property, or
to gain competitive advantage.
The perpetrators of an APT launch their
intrusion with the goal of stealing
information—perhaps intending to sell it
to a competitor. And when they want to
gather more data, they don’t need to
breach network defenses again, since
they’re already inside the network and
presumably undetected. “Advanced
persistent threats reinforce the idea that
the current cybercrime landscape is
driven by business-minded, wellorganized crime syndicates,” warns Henry
Stern, senior security researcher at Cisco.
1
A system on the target
network is infected by a
drive-by download.
Command System
Compromised
Web Server
2
The compromised
system opens a tunnel
to a command-andcontrol server.
Command-andControl Server
Firewall
4
The attacker
exfiltrates stolen
data through the
tunnel.
3
An attacker uses the
tunnel to access a
target system behind
the firewall.
Target
System
Attacker
Advanced Persistent Threats (APTs) remain under the security-detection
radar, and thus are difficult to detect and eliminate.
22
Cisco 2010 Midyear Security Report
How can enterprises combat such
sophisticated and potentially devastating
threats? Not surprisingly, detection of APTs
is difficult once they have established a
presence in your network. “When a hacker
is inside the network, it really becomes
a game of hide-and-seek,” notes Kurt
Grutzmacher of the Cisco Advanced
Services Security Posture Assessment
team. Most corporate security systems
are concentrated on inbound traffic only,
which means that if an APT manages to
work its way past the perimeter defenses,
it may not be detected again.
The best defense against APTs is to
prevent infection to begin with, relying
on user education and network- and hostbased defenses. However, enterprises
must acknowledge the risk of APTs, and
have the ability to detect them if an
infection occurs. Enterprises often have
the tools necessary to detect APTs
and stop data exfiltration, but they lack
awareness of this threat’s existence, and
therefore do not focus attention on them.
Enterprises’ tools to detect APT infections
on corporate networks include network
monitoring, egress filtering, and data loss
systems in conjunction with baselining
“normal” network usage, outbound traffic
log analysis, and data on the commandand-control nodes used as upload
points for data theft. These tools, used in
combination, are key to detection of the
APT threat.
Risk Alert:
The Downside of Being a VIP
(or Just Working for One)
Not all vulnerabilities lie in an enterprise’s
hardware and software. Highly visible
executives are walking and talking
vulnerabilities because they are privy to
sensitive business information. So, too, are
other employees who are authorized to
access financial information, intellectual
property, and other highly sensitive
data—in fact, such workers are potentially
more vulnerable and more frequently
targeted than top executives. They are
prime targets because the payoffs can
be great. Instead of sending a phishing
email to every employee in an attempt to
steal network login info—a scattershot
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Small Targets, Big Rewards
Small towns, cities, counties, and municipalities—and small banks and credit
unions—have become popular targets
for looters of online bank accounts. The
theft of “modest” sums ranging from
US$10,000 to US$500,000—or more—
can quickly grow the balance sheets of
successful criminals.
In one recent case in the United States,
thieves targeted the assistant of the
administrator of a small town near
Chicago. When the assistant attempted
to log on to the town’s local bank
account, she was redirected to a page
informing her the bank’s website was
experiencing technical difficulties—a
delay tactic that allowed the criminals
enough time to create their own
interactive session with the account.21
The assistant was even provided a fake
phone number for customer service,
which she later called and found to be
a residential number.
By the next day, the thieves had
transferred US$70,000 out of the town’s
bank account. Fortunately, the bank
(after notifying town staff of the previous
transfers and learning they were the
work of thieves) was able to halt one
fraudulent wire transfer of US$30,000.
This prevented the total amount stolen
from the small Illinois town of 10,000
from reaching six figures.
21 “Computer Crooks Steal $100,000 from Ill. Town,” by Brian Krebs, Krebs on Security blog, April 6, 2010,
http://krebsonsecurity.com/2010/04/computer-crooks-steal-100000-from-ill-town/.
approach that is easier to detect and
block—criminals prefer to hone in on
someone with access, because that
individual can lead them directly to what
they want.
Aside from technological approaches to
preventing phishing messages (such as
reputation management) from reaching
executives and other VIPs, prevention
comes from a heightened awareness of
the danger of exposing insider data
unwittingly to the public. Cybercriminals
have become adept at creating very
convincing phishing emails designed
for so-called “whaling,” because there
is so much detailed information about
executives available in the public domain.
Even a few indiscreet Twitter or Facebook
posts by a highly placed executive can
provide enough hints for criminals trying
to decide if your business has information
someone else will pay for. Criminals are
also skilled at piecing together seemingly
innocent bits of data to crack passwords
and hack into email accounts.
“If a stranger came up to you on the street,
would you give him your name, Social
Security number, and email address?
Probably not,” wrote New York Times
reporter Steve Lohr in March of this year.
Yet, wrote Lohr, everyone from CEOs
to teenagers has become conditioned
to the idea of sharing all sorts of private
and professional information. Last year,
reported the Times, researchers from
Carnegie Mellon University demonstrated
that, using publicly available information
from several sources such as social
networks, they could reliably predict
the Social Security numbers of nearly
5 million Americans in fewer than 1000
attempts.
Threats directed to top executives are
not always delivered by email, however—
devices also can become a channel to
be exploited. Executives are quite often
the employees pushing hardest to have
the devices they want, such as trendy
smartphones, allowed into the enterprise.
Many don’t even ask IT for permission
when they access corporate assets with
unsupported devices, creating obvious
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
data and network security risks. Some
criminals, recognizing this, aim Trojans
directly at devices used by executives,
such as smartphones—or even a device
far less complicated, like a USB drive.
Once the device is connected to a
laptop or desktop computer, the Trojan
can launch and seek access to sensitive
corporate data.
The mobility of today’s executives
compounds privacy and security
headaches: The more time on the road,
the more opportunities for laptops and
mobile devices to be stolen or lost. The
C-suite and other VIPs in the organization
need the same training that all workers
receive—and perhaps, even a bit more.
They must understand the risks to the
enterprise due to their everyday use
of technology, from slipping sensitive
competitive information into a seemingly
innocuous discussion via social networks
to leaving their laptop in an airport terminal
to using a malware-carrying flash drive
they picked up at a recent trade show.
Cisco 2010 Midyear Security Report
23
19%
Social networking
31%
What Keeps Your IT Security Team Awake at Night?
Unauthorized users
*More than one answer allowed.
New research data from Cisco reveals what IT security
professionals—those responsible for setting, maintaining,
and communicating corporate security policies—believe are
some of the most worrisome security risks to the enterprise.
The top five issues, according to a global multiple choice
survey of IT security decision-makers from organizations in
industries ranging from education to government to finance
to transportation, are depicted in the graphic below.*
Meanwhile, 56 percent of all respondents noted that
their employees are using unsupported applications.
The graphic below lists the types of unsupported
applications that are most prevalent in the enterprise,
according to the survey results.*
33%
Cloud applications, such as Amazon
47%
9%
Peer-to-peer applications
Unsupported devices (mobile) and collaborative applications
47%
10%
Collaborative applications, such as Google Apps
Unsupported devices (not mobile)
68%
15%
Social networking
New applications
*More than one answer allowed.
19%
Social networking
31%
Unauthorized users
*More than one answer allowed.
“The top five concerns of IT security professionals worldwide clearly align with the technologic, economic, and
demographic forces of change that are having an impact on
businesses,” notes Ambika Gadre, senior director of security
product marketing, at Cisco. “IT teams are concerned about
unauthorized users gaining access to the network and
sensitive corporate data by taking advantage of two areas
33%
where the enterprise increasingly lacks visibility and control:
Cloud applications, such as Amazon
unsupported mobile devices and Web 2.0 applications.”
47%
Restrictive
Policies Common Worldwide
Peer-to-peer applications
More than 40 percent of all survey respondents said they
47%
have determined their employees are using unsupported
Collaborative applications, such as Google Apps
network devices, and 80 percent said they restrict what
68% in the
employees bring onto the network (with organizations
Social
networking
United States and Germany being the most restrictive). And
four in 10 IT security professionals report their company has
*More than one answer allowed.
lost information due to unsupported network devices.
However, nearly the same number (39 percent) of respondents
said their organizations are “very likely” to allow employees’
personal devices on the network in the next 12 months—with
China (59 percent) and India (54 percent) being most receptive
to that change, even though survey results for those countries
show they had the highest number of data losses or security
breaches due to such devices. Overall, only 7 percent of
organizations worldwide already allow the use of personal
devices on the enterprise network, according to the survey.
24
Cisco 2010 Midyear Security Report
Nearly half of respondents (48 percent) said their organization
tracks application vulnerabilities through vendor notifications.
More than half of all respondents said they conduct assessments of the security applications and operating systems that
employees are using, the types of devices and nonsecurity
applications they are running, and at what locations they
are working.
Employee Training Central to Policy Enforcement
When it comes to enforcing security policies in the enterprise,
62 percent of IT decision-makers surveyed said employee
training is their top approach, followed by:*
•URL filtering (57 percent)
•Monitoring only (41 percent)
•Data loss prevention technology (39 percent)
*More than one answer allowed.
In addition, the majority of Cisco survey respondents from
China and India (71 percent) said they recognize that overly
strict security policies can have a negative impact on hiring
and retention of employees who are under the age of 30
(Generation Y). But roughly four in 10 IT security decisionmakers in Germany (39 percent) and Japan (42 percent)
perceive that restrictive policies will have no impact at all on
attracting and keeping employees from the Generation Y
demographic pool.
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Five Ways Enterprises Can
Strengthen Their Security by 2011
While most organizations are grappling with the same forces of change—the proliferation
of mobile and connected devices, virtualization and cloud computing, and trends
such as social networking that are transforming the way employees collaborate and
communicate—they do not necessarily face the same security challenges.
An organization’s network infrastructure, and the security that supports it, is a complex
ecosystem that is always changing. What and whom the business needs to protect varies as
well. Each new event—whether a merger or acquisition, hiring or downsizing, or a new product
launch—has an impact on what the enterprise needs to protect.
However, in addition to the advice presented throughout this report, there are several steps
that businesses, with guidance from their IT teams, and involvement and support from their
employees, can take to strengthen their enterprise security within the next six months. These
measures will help the organization respond to the tectonic forces of change now in motion,
and to build a foundation that will allow it to adapt more readily to future changes that affect
enterprise security.
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Cisco 2010 Annual Security Report
25
spend less time checking to see if certain networked devices
are not patched or configured in such a way to make them
affected by the recently disclosed vulnerabilities.
1
Close Gaps in
Situational Awareness
“Moment by moment” awareness of the state of the network
is needed because the enterprise is in a constant state of
change—you acquire a new company, hire new employees,
change applications, and add new devices. Most enterprises
are simply not aware of the totality of their network: There
are outliers—disconnected elements—that present real
risk. There are many moving parts and areas of low visibility
to monitor and manage, such as mobile workers, mobile
devices, web-based collaborative applications, and the cloud.
By taking stock of these elements, IT teams gain better
visibility into the overall network security posture. They also
can identify and correct weaknesses more easily, and remove
or block those things that should not be connecting to the
network. Unfortunately, many IT departments, especially
those whose budgets were cut when the economy stumbled,
are focused primarily on blocking immediate threats or patching
major vulnerabilities. (Important steps, to be sure, but not
enough.) There often isn’t enough time or money for thorough
reconnaissance of network practices. And executives may
not encourage IT to spend time implementing practices that
don’t appear to have an immediate return on investment.
Most enterprises are simply not
aware of the totality of their network.
Yet enterprises are likely to save time and money when they
do step back and assess whether simple steps are being
pursued to reduce vulnerabilities. These actions require
front-end investment in “people resources” (the costs
come from employee time, not from hardware or software
purchases). But it’s an investment that pays off down the road
when vulnerabilities are disclosed, and the IT department can
26
Cisco 2010 Midyear Security Report
For instance, networking systems often have little-used,
unneeded, or insecure features or services enabled by
default, such as Telnet, TFTP, or certain DNS services. As Cisco
has noted in previous security reports, cybercriminals are
endlessly creative when it comes to finding new ways to
launch attacks, and will even use “old school” methods (such
as exploiting past vulnerabilities) that they believe will escape
detection. Proactive IT departments will disable unused
services, such as operating system add-ons, to avoid future
malware infections.
And to avoid a scenario in which certain network devices drop
off the radar of network control, enterprises should adopt a
change-control approach to managing devices. In other words,
several stakeholder groups—such as desktop, network
operations, and IT security—need to all be informed when a
device is made active on the network, as well as when it has
been removed from use.
2
Focus First on Solving “Old”
Issues—and Doing It Well
Many of the security issues considered to be “new”
problems are actually old issues that can be managed and
secured using existing, effective practices. One word of
caution, however: Organizations should start by working to
solve a limited number of things—and doing them well—
instead of trying to solve too many problems at once, only
to arrive at mediocre results or unfinished projects.
Software updating and patching is a good place for many
organizations to begin making improvements: Enterprises
have steadily lost control over the software that’s installed
on technology assets. The task of managing what software
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
employees could use, and what programs were forbidden,
was much easier when networks were closed, IT staff could
touch each and every desktop and laptop computer, and
employees only worked when they were using a corporateapproved device.
Software updating and patching is a
good place for many organizations to
begin making improvements.
The solution to the outdated software problem is to develop
a system for centralized management of approved software,
and for delivering updates. For instance, automated patching
and software updates eliminate the reliance on workers to
carry out these crucial tasks. In addition, enterprises can offer
software configuration support on a centralized basis for all
IT-supported platforms.
However, recognizing the difficulty of thorough management
of updating and patching, it may make more sense for
enterprises to implement other measures that serve a similar
purpose. “Businesses should expand their view of vulnerability
management to include easily applied leading practices and
mitigations that can relieve some of the strain on updating
With today’s unwieldy networks comprised of a mix of
and patching,” says Russell Smoak, senior director of Cisco
officially sanctioned technology equipment, and whatever
Security Research and Operations. “For example, blacklisting,
mobile devices workers have decided suit their needs,
whitelisting, and ingress and egress filtering are all easier
enterprises can’t guarantee that everyone is using approved
to apply, update, and control than deploying patches and
versions of corporate software. Employees, like computer
updates across an enterprise.” What’s more, they can provide
users everywhere, are likely to ignore constant reminders to
upgrade to the latest version of the Microsoft Internet Explorer the luxury of additional time to deploy upgrades and patches,
without leaving critical resources unprotected.
or Mozilla Firefox browsers. Nor can enterprises assume that
all software has been properly patched.
In addition, executives may not have come to the realization
that software development cycles have shortened for many
vendors. While new versions of software formerly were
released on a semi-yearly or yearly basis, some vendors,
including Adobe, Apple, and Microsoft, are delivering patches
and updates more frequently. For instance, in the first three
months of 2009, Microsoft announced 58 vulnerabilities;
in the first three months of 2010, the company announced
77 vulnerabilities. In the same time period in 2009, Adobe
announced nine vulnerabilities; in the first three months of
2010, 26 vulnerabilities. (In the first three months of 2009,
Cisco announced 45 vulnerabilities; and in the first three
months of 2010, the company announced 44 vulnerabilities.)
Adobe executives recently indicated that they would consider
reducing the time frame between security updates for its
Adobe Reader product from 90 days to 30 days, in part
because of the increase in vulnerabilities.
Allow users to be part of the security solution by encouraging
bidirectional communication about security issues. When
It is essential for enterprises to monitor the vulnerability
educating users, explain the security issues the enterprise
disclosures of their key vendors and be ready to act accordneeds to address, and ask them how they can help the
ingly to reduce potential exposure to new vulnerabilities.
organization to solve these problems. The most effective
This process should include informing employees. Without
implementing these frequent updates, workers are increasing training uses real-world examples of criminals and attacks
to show employees that threats are genuine and can cause
the likelihood of falling victim to exploits that are delivered
significant damage.
via software vulnerabilities. Criminals are as innovative as
software developers, and are continually on the alert for new
Be sure to target C-level and other VIPs for extensive
ways to hack into a network or launch an executable malware education, as they are prime targets for phishing and social
file via an unpatched piece of software.
engineering schemes designed to connect hackers with
3
Educate Your Workforce
on Security—and Include
Them in the Process
sensitive business information (see the Downside of Being
a VIP (or Just Working for One), page 22). Enterprises also
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Cisco 2010 Midyear Security Report
27
should enlist their millennial workforce in their efforts to
improve security. Gen Y employees are often more
comfortable and familiar with popular technology, such
as social networking, and can help workers from other
generational groups learn how to navigate such technology
and use it appropriately—once millennial employees
themselves have been fully educated on the enterprise’s
security policy, of course.
Target C-level executives and other
VIPs for extensive education, as they
are prime targets for phishing and
social engineering schemes.
While most users (of any generation) have become savvier
about not clicking on suspect links from Facebook friends
or within an instant chat message, there is evidence that
Generation Y is a bit sloppy about revealing sensitive
business and personal information across these networks.
According to a recent study by Accenture, “Millennials have a
much looser notion of online privacy than do older workers,”
with 30 percent of millennials saying that they write openly
about themselves online.
This casual approach to sharing personal information has
become more of a threat than suspect links in emails from
supposed “friends.” Since criminals are honing their skills in
gathering available data on a business or its top executives
to launch an attack, indiscreet chat about upcoming product
launches or personnel changes can cause more damage
than ever. The website WikiLeaks.org, which publishes leaked
information from government organizations and corporations,
has collected more than 1 million documents—apparently,
sensitive data is not all that difficult to find.
“Workers need to have a heightened awareness of the pain
they can cause a business when they over-share information via social networks,” advises Seth Hanford, Intelligence
Operations Team Lead at Cisco. “They may be unaware that
they could put customers, their own jobs, and others at risk,
along with the enterprise’s ability to turn a profit. Executives
need to clearly state the ramifications of workers’ actions.”
28
Cisco 2010 Midyear Security Report
In addition to properly advising users about the impact of
sharing business information, enterprises need to shift their
thinking about security toward a “culture of yes.” Instead of
banning all social networking in a bid to improve security, for
example, the enterprise should take steps to protect data as
it moves through these networks.
Hanford concludes, “If users don’t know what is expected
of them, one should have no expectation that they will take
the right steps to protect the data that the enterprise needs
to safeguard.”
4
Understand That One
Security Border Is No
Longer Enough
IT professionals used to focus on finding better, more efficient
ways to fortify the security border that protected the network.
All the applications an employee needed for work were located
within the network, which they accessed from a corporateissued device and from within the corporate office. The
security threats they encountered came from outside the
network, via email or web traffic. But now, business is
becoming “borderless” and so, too, is the network, which
means there are multiple borders to protect instead of just
one, and they are constantly changing.
This report outlines the tectonic forces of change bringing
forth the borderless enterprise. Employees are accessing the
network and sharing data through an array of mobile devices
and web-based applications. Services, functions, and business
operations are being externalized. The “fortress” approach to
security of the past clearly is no longer adequate. With workers
collaborating and sharing vital information far beyond the walls
of the workplace, every hour of every day, security that’s
limited to the network edge is bound to fail.
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
More than that, today’s hackers are skilled at breaking
through traditional security perimeters and are finding it
all too easy to penetrate the “soft spots” in the enterprise
where sensitive data resides and is not protected by any
security border (see Insight from the Security Researchers:
Hackers Are Choosing Their Own Adventure, page 20).
Never before has it been more important for enterprises to
adopt a layered approach to security, and to make certain
that wherever critical data flows or resides, it is protected
by intelligent technology solutions, rich policies, robust
enforcement practices, and a workforce who has been
educated about security risks and who understand their
role in helping to mitigate them.
Business is becoming “borderless,”
and so, too, is the network, which means
there are multiple borders to protect…
and they are constantly changing.
5
View Security as a
Differentiator for Your
Business
Strengthening enterprise security should never be a
back-burner agenda item for businesses. It is an asset—
and in many ways, it can be a competitive tool. Leading
organizations are aligning their security investments with
their business objectives and finding that it allows them to
adapt more quickly and confidently to changing business
conditions, take advantage of new technologies and markets, and enhance the customer experience.
How an enterprise approaches security and
responds to trends such as social networking
and mobility can have a direct impact on its
ability to hire and retain talent.
Many businesses are also beginning to fully recognize the
importance of protecting their data, regardless of where it
resides or moves. And they are realizing that by strengthening
their enterprise security, they can ensure compliance with
industry and government regulations and reduce the risk
of litigation from data loss or security breaches. Ultimately,
a proactive approach to security can help to preserve the
company’s reputation and protect its financial assets.
How an enterprise approaches security and responds
to trends such as social networking and mobility can also
have a direct impact on its ability to hire and retain talent,
particularly from the Gen Y demographic pool. Robust
security practices allow businesses to provide employees
with the widest appropriate levels of access to the tools
and applications they need to work remotely—as well
as effective defenses against inappropriate use or
unauthorized access.
Inadequate, outdated security, meanwhile, poses a
significant risk to the enterprise and its assets, from intellectual property to devices to employees—and customers
and business partners as well. And if those who do, or
would like to, conduct business with your organization have
not yet inquired about your company’s security policies,
processes, and practices, be assured that they will.
Network and IT systems make up some of an organization’s
most critical infrastructure. Together, they are the “endoskeleton”
supporting the business and protecting its data. And like a
living thing, if that vital framework is neglected, it will surely
fail—especially when under pressure. The tectonic forces
are creating unprecedented stress on the enterprise:
Businesses must take action now to test the robustness of
their infrastructure and implement effective security
practices so they can endure—and thrive—in the new
landscape formed by these changes.
It is important for enterprises to recognize, however, that
there is no “silver bullet” technology solution that can meet
all their security needs. A layered approach that includes
depth and breadth of defense is the only way to meet the
challenges and protect the opportunities presented to the
enterprise by these forces of change and the emerging
borderless network.
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Cisco 2010 Midyear Security Report
29
Security Trends: Midyear Notes
In each Cisco Security Report, Cisco security experts combine their knowledge and insight to make educated
predictions about security threats and trends that are likely to be significant in the next six to 12 months, taking into
account emerging trends and recent activity by the cybercriminal community—both in terms of user behavior and
attack methods and exploits. Following are a few of the trends discussed in the Cisco 2009 Annual Security Report 22,
and some recent developments since the report was published.
Spam Volume is Expected to Rise Up to
30 Percent Worldwide Over 2009 Levels
According to new research compiled by Cisco Security
Intelligence Operations (SIO), spam volume worldwide is on track
to rise by up to 30 percent over 2009 levels. However, it should
be noted that spam volume was lower than might have been
expected in the first six months of 2009 because worldwide spam
volume plummeted following the takedown of Internet hosting
provider, McColo, which hosted the Reactor Mailer commandand-control infrastructure that controlled the Srizbi/Reactor
Mailer botnet.
The latest figures from Cisco SIO show that the United States is
once again the spam leader among countries worldwide, pushing
Brazil down to third place after the country occupied the top
position for only a few months. Overall spam volume actually
declined for both countries in the period from November 2009
through June 2010—but the percentage of global spam from
Brazil decreased much more than that from the United States
(Brazil, -4.30 percent; the United States, -0.56 percent). Cisco
security experts suspect the decrease in Brazil’s spam volume
could be related to more Brazilian ISPs limiting Port 25 access,
an important spam-blocking technique.
India, meanwhile, moves up to second place from third. Since
the end of 2009, there has been only a modest increase in
the percentage of global spam originating from that country
(+1.10 percent). Russia leaps from ninth place to fourth among
spam-originating countries, even though its percentage of
global spam volume actually declined slightly during the first
six months of 2010 (-0.26 percent).
Spam Trends by Originating Country
November 2009 – June 2010
Percentage of
Global Spam
Spam
Trend
United States
8.98%
-0.56%
India
8.61%
1.10%
Brazil
6.71%
-4.30%
Russia
6.43%
-0.26%
South Korea
3.83%
-0.86%
Vietnam
3.74%
-1.65%
Ukraine
3.60%
0.53%
Germany
3.34%
1.99%
China
3.22%
-1.19%
Country
Italy
2.80%
1.30%
United Kingdom
2.74%
2.39%
Colombia
2.58%
-1.30%
Source: Cisco Security Intelligence Operations
22Cisco 2009 Annual Security Report, www.cisco.com/en/US/prod/collateral/vpndevc/cisco_2009_asr.pdf.
30
Cisco 2010 Midyear Security Report
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Vietnam, which had a peak in spam volume during the October
to November 2009 time frame, retains its position at sixth place,
while its spam levels continue to trend down. The country’s
global spam levels declined by 1.65 percent in the period from
November 2009 to June 2010.
After experiencing similar spikes in their spam volume during the
same period last fall, South Korea and Turkey—both in the top
five at the end of 2009—saw their percentage of global spam
volume drop in the first half of 2010. South Korea had only a slight
decrease (-0.86 percent) and has moved to fifth position from
fourth place. But Turkey’s spam volume has declined so much
that it is now ranked 25th among spam-originating countries
worldwide, according to research from Cisco SIO.
Falling off the list since December 2009, in addition to Turkey, are
Argentina and Poland. And moving into the top 10 since the end
of last year are Colombia, Germany, Italy, Ukraine, and the United
Kingdom. Of those five countries, the United Kingdom has seen
the greatest increase (+2.39 percent) over the past six months
in the percentage of global spam volume that it originates;
Germany had the second highest increase (+1.99 percent)
among the newcomers to the list.
Meanwhile, in the first half of 2010, China fell two spots on the
list to ninth place. While there was a significant reduction (-24.3
percent) in the percentage of global spam originating from China
during 2009, the trend decrease has been slight (-1.19 percent)
since November 2009.
More Attacks on Legitimate Websites
Cybercriminals are still targeting legitimate websites—but some
are now employing them in multivector attacks with a focus on
spam. In late March, attackers sent a wave of spam messages
targeting customers of the highly popular Apple Store. The
attackers, which strategically timed their campaign just before
the launch of Apple’s iPad, coordinated their attacks with
thousands of legitimate websites and spam imitating an Apple
Store notice with links to the compromised websites. The attack
also redirected compromised traffic to a Canadian pharmacy
website, which served up a fake anti-virus Trojan.
Social Networks:
A Cybercrime Hotspot for 2010
While social networking worms appear to have decreased since
the publication of the Cisco 2009 Annual Security Report, attacks
using social media have increased—and new threats are emerging.
One particularly disconcerting trend is that social networks are now
attracting a more dangerous criminal element: terrorists. (See
Taking Action to Reduce Innovation Gaps, page 16).
The U.S. government is concerned enough about social
networking’s role as a tool for terrorists that the U.S. Army
Research Laboratory recently provided a nearly US$17 million,
five-year grant to Rensselaer Polytechnic Institute to examine
how social networks and other technology, including smartphones,
can be used to organize, coordinate, and incite potential
attacks against the United States.23
Fake Apple Store Messages as a Percent of Total Spam
3.5%
Leveraging the highly anticipated release of
Apple’s iPad tablet PC, multiple waves of email
spam were sent worldwide in an effort to dupe
recipients who may have pre-ordered the iPad
and wanted to check their latest availability status.
Percent of Spam
3.0%
2.5%
2.0%
1.5%
1.0%
0.5%
Mar 24-08:00
Mar 24-06:00
Mar 24-04:00
Mar 24-02:00
Mar 24-00:00
Mar 24-22:00
Mar 24-20:00
Mar 24-18:00
Mar 24-16:00
Mar 24-14:00
Mar 24-12:00
Mar 24-10:00
Mar 24-08:00
Mar 24-06:00
Mar 24-04:00
Mar 24-02:00
Mar 24-00:00
Mar 23-22:00
Mar 23-20:00
Mar 23-18:00
Mar 23-16:00
Mar 23-14:00
Mar 23-12:00
0.0%
Day/Time
23 “When Social Sites Are Weapons,” by Larry Rulison, TimesUnion.com, May 5, 2010, www.timesunion.com/AspStories/story.asp?storyID=928058&category=RENSSELAER.
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Cisco 2010 Midyear Security Report
31
Cisco Security Intelligence Operations
Cisco Security Intelligence Operations (SIO) is an advanced security infrastructure that enables the highest level
of security and threat detection and prevention for Cisco customers. With sophisticated security intelligence,
more than 750,000 sensors deployed worldwide, automated update systems, and a team of global research
engineers, threat experts, statisticians, and analysts, as well as 76 patents and 250 certifications, Cisco SIO helps
organizations gain visibility into the latest threat landscape and plays a critical role in helping Cisco to secure
borderless networks for customers worldwide.
It has become an increasing challenge to manage and secure
today’s distributed and agile networks. Cloud computing and the
sharing of data are threatening security norms. Online criminals
are continuing to exploit users’ trust in consumer applications
and devices, increasing the risk to organizations and employees.
Traditional security, which relies on layering of products and the
use of multiple filters, is not enough to defend against the latest
generation of malware, which spreads quickly, has global targets,
and uses multiple vectors to propagate.
Cisco SIO, a cloud-based service, uses three components that
enhance the filters already available in Cisco devices:
•Cisco SensorBase : The world’s largest threat-monitoring
network, Cisco SensorBase captures global threat telemetry
data from an exhaustive footprint of Cisco devices and
services—this includes more than 1 terabyte of data per
day and 30 percent of the world’s email traffic.
®
•Cisco Threat Operations Center: A global team of security
analysts and automated systems that extract actionable
intelligence. Additionally, Cisco “White Hat” engineers provide
services such as penetration testing, botnet infiltration, and
malware reverse engineering.
•Dynamic updates: Real-time updates are automatically
delivered to security devices, along with effective practice
recommendations and other content dedicated to helping
customers track threats, analyze intelligence, and, ultimately,
improve their overall enterprise security posture.
32
Cisco 2010 Midyear Security Report
Cisco is committed to providing complete security solutions
that are integrated, timely, comprehensive, and effective—
enabling holistic security for organizations worldwide. With Cisco,
organizations can save time researching threats and vulnerabilities,
and focus more on taking a proactive approach to security.
For more information on Cisco SIO, visit www.cisco.com/go/sio.
Cisco Security IntelliShield Alert Manager Service provides
a comprehensive, cost-effective solution for delivering the
vendor-neutral security intelligence organizations need to
identify, prevent, and mitigate IT attacks. This customizable,
web-based threat and vulnerability alert service allows
security staff to access timely, accurate, and credible information about threats and vulnerabilities that may affect their
environments. IntelliShield Alert Manager allows organizations
to spend less effort researching threats and vulnerabilities,
and focus more on a proactive approach to security.
Cisco offers a free 90-day trial of the Cisco Security
IntelliShield Alert Manager Service. By registering for this trial,
you will have full access to the service, including tools and
threat and vulnerability alerts.
To learn more about Cisco Security Intellishield Alert
Manager Services, visit: https://intellishield.cisco.com/
security/alertmanager/trial.do?dispatch=4
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
For More Information
Cisco Security Intelligence Operations
www.cisco.com/security
Cisco Security Blog
blogs.cisco.com/security
SenderBase
www.senderbase.org
Cisco Security Services
www.cisco.com/go/ros
www.cisco.com/go/intellishield
Cisco Security Products
www.cisco.com/go/security
www.cisco.com/go/asa
www.cisco.com/go/ips
www.ironport.com
www.scansafe.com
Cisco Corporate Security
Programs Organization
www.cisco.com/go/cspo
All contents are Copyright © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Cisco 2010 Midyear Security Report
33
Report available for download at www.cisco.com/go/securityreport
Americas Headquarters
Cisco Systems, Inc.
San Jose, CA
Asia Pacific Headquarters
Cisco Systems (USA) Pte. Ltd.
Singapore
Europe Headquarters
Cisco Systems International BV
Amsterdam, The Netherlands
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks
mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R)
Americas Headquarters
Cisco Systems, Inc.
San Jose, CA
Asia Pacific Headquarters
Cisco Systems (USA) Pte. Ltd.
Singapore
Europe Headquarters
Cisco Systems International BV
Amsterdam, The Netherlands
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks
mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R)
C02-608421-00 7/10
Download